Medium severity4.3NVD Advisory· Published Jun 3, 2023· Updated Apr 8, 2026
CVE-2023-0583
CVE-2023-0583
Description
The VK Blocks plugin for WordPress is vulnerable to improper authorization via the REST 'update_vk_blocks_options' function in versions up to, and including, 1.57.0.5. This allows authenticated attackers, with contributor-level permissions or above, to change plugin settings including default icons.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- plugins.trac.wordpress.org/browser/vk-blocks/trunk/inc/vk-blocks/App/RestAPI/BlockMeta/class-vk-blocks-entrypoint.phpnvdPatch
- www.wordfence.com/threat-intel/vulnerabilities/id/12a94f5b-bc30-4a65-b397-54488c836ec3nvdThird Party Advisory
- plugins.trac.wordpress.org/changeset/2921566/vk-blocks/tags/1.57.1.0/inc/vk-blocks/App/RestAPI/BlockMeta/class-vk-blocks-entrypoint.phpnvd
News mentions
0No linked articles in our index yet.